CVE-2025-23016:FastCGI 2.4.5 之前的整数溢出和缓冲区溢出漏洞
FastCGI库发布2.4.5版本修复CVE-2025-23016漏洞,该漏洞由整数溢出引发堆缓冲区溢出,建议升级并限制FastCGI套接字访问权限。 2025-4-23 20:35:0 Author: seclists.org(查看原文) 阅读量:10 收藏

oss-sec logo

oss-sec mailing list archives


From: Alan Coopersmith <alan.coopersmith () oracle com>
Date: Wed, 23 Apr 2025 13:33:27 -0700

Version 2.4.5 of the fastcgi library was released last week:
https://github.com/FastCGI-Archives/fcgi2/releases/tag/2.4.5

It fixed CVE-2025-23016, which is described as "an integer overflow (and
resultant heap-based buffer overflow) via crafted nameLen or valueLen
values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c."

The upstream bug report can be found at:
https://github.com/FastCGI-Archives/fcgi2/issues/67

and a detailed writeup from the discoverers at:
https://www.synacktiv.com/en/publications/cve-2025-23016-exploiting-the-fastcgi-library

which suggests both upgrading to the fixed version and "limiting potential
remote access to the FastCGI socket by declaring it as a UNIX socket."

--
        -Alan Coopersmith-                 alan.coopersmith () oracle com
         Oracle Solaris Engineering - https://blogs.oracle.com/solaris


Current thread:

  • CVE-2025-23016: Integer & buffer overflow in fastcgi < 2.4.5 Alan Coopersmith (Apr 23)

文章来源: https://seclists.org/oss-sec/2025/q2/80
如有侵权请联系:admin#unsafe.sh